New Lockbit-linked ransomware group targets Fortinet vulnerabilities

A ransomware group with connections to LockBit has been actively targeting two Fortinet vulnerabilities to spread a novel ransomware strain dubbed “SuperBlack,” Forescout reported Wednesday.The threat actor, tracked as Mora_001, has been using the LockBit 3.0-based strain in campaigns between late January and March 2025, targeting exposed Fortigate firewalls vulnerable to CVE-2024-55591 and CVE-2025-24472.CVE-2024-55591 is a critical remote authentication bypass vulnerability affecting FortiOS versions 7.0.0 through 7.0.16 and FortiProxy versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12. The actively exploited zero-day was first disclosed on January 14, 2025, and a proof-of-concept exploit was published by watchTowr on January 28.CVE-2025-24472 is a related high-severity FortiOS/FortiProxy authentication bypass zero-day affecting the same product versions that was reported to Fortinet by victims of an attack investigated by Forescout. CVE-2025-24472 is addressed by the same patch that resolves CVE-2024-24472.

Mora_001 attack chain deploys SuperBlack ransomware for double extortion

The Mora_001 threat actors use CVE-2024-55591 or CVE-2025-24472 to make initial access and gain “super_admin” privileges within the FortiOS appliance. The attackers create new privileged accounts with names including “forticloud-tech,” “fortigate-firewall” and “administrator [sic].”Also observed was the creation of an account with the username “watchTowr,” which was later deleted, showing that the attacker leveraged the available PoC exploit in their attack.For firewalls with VPN capabilities, the attackers created local user accounts that copied the names of legitimate users but with the addition of one number at the end, helping to evade detection and maintain persistence access.For firewalls without VPN capabilities, the threat actor used high availability (HA) configuration propagation or abuse of authentication infrastructure such as the Remote Authentication Dial-In User Service (RADIUS) to compromise other firewalls on the network.The HA functionality allows the configuration of one firewall to be synchronized to others within the same cluster, allowing a compromised configuration to be replicated across the network along with Mora_001’s backdoored accounts.Mora_001 also leveraged access to several FortiGate dashboards, including the status, security, network, users & devices and WiFi dashboards, to gather additional intelligence and identify avenues for lateral movement, and used the VPN Brute v1.0.2 tool to attempt to brute force additional firewall accounts.The attackers prioritized file servers, authentication servers, domain controllers, database servers and other high-value targets for lateral movement to maximize the impact of their encryption and double extortion.They primarily utilized Windows Management Instrumentation (WMIC) for remote system discovery and execution and used SSH to access additional systems, according to Fortinet.A custom data exfiltration tool unique to the SuperBlack ransomware variant was deployed prior to encryption and a wiper tool was utilized after encryption to remove evidence of ransomware executable. A ransom note was also left behind by the attacker.

SuperBlack’s complex connections to LockBit, other ransomware groups

As noted, SuperBlack is a variant of the LockBit 3.0 builder, also known as LockBit Black, which was leaked in 2022. The SuperBlack ransom note is nearly identical to that of the LockBit 3.0 template but with all LockBit branding removed.However, Forescout researchers noted that the TOX chat ID included in the ransomware note is still linked to LockBit, suggesting that Mora_001 may be a former affiliate or sharing some LockBit infrastructure. Despite this, the unique customization of SuperBlack sets this threat actor apart from typical LockBit affiliates.Forescout also noted potential connections to other ransomware groups; the wiper component, which Forescout calls WipeBlack, has been used in previous ransomware attacks linked to LockBit and BrainCipher. BrainCipher itself has ties to additional groups known as SenSayQ, EstateRansomware and RebornRansomware.The researchers also identified a SuperBlack sample with an import hash previously associated with LockBit and another strain called BlackMatter.“Mora_001’s relationship to the broader LockBit’s ransomware operations underscore the increased complexity of the modern ransomware landscape – where specialized teams collaborate to leverage complementary capabilities,” the Forescout researchers wrote.

Recommended mitigations for SuperBlack ransomware

Immediate patching of the Fortinet zero-days is key to preventing exploitation, according to Shadowserver, more than 31,000 FortiGate instances remain exposed, including more than 7,600 in the United States.  Users are also advised by Forescout to disable external management access to their firewalls and VPNs whenever possible and regularly audit admin accounts to identify and remove any unknown users.Mora_001 was observed using automated scripts to probe for vulnerabilities and maintain persistence, so administrators should also check for suspicious automation tasks running on their systems.

Source link